A database dump is a complete copy of a database, including all tables, data, and structure, saved as a single file. This is usually done in a specific file format, such as SQL, that can be imported back into the same or another database later.
Backups, on the other hand, are a way to protect data against loss or damage. A backup is a copy of the data that can be used to restore the database to a previous state in case of a failure, such as hardware failure, user error, or software bugs. Backups can be done on a regular schedule, such as daily or weekly, and can be stored in various locations, such as cloud storage, local disks, or tape drives.
In summary, export/import is a way to move data between databases, while database dump/backup is a way to make a copy of a database or protect it from data loss.
6.0 Security Summarize confidentiality concerns.
Confidentiality concerns refer to the protection of sensitive information from unauthorized access or disclosure. Some common confidentiality concerns include:
Snooping: This refers to the unauthorized access or monitoring of data transmissions, such as email or instant messaging conversations.
Eavesdropping: This is similar to snooping, but specifically refers to the interception of voice or video communication, such as phone calls or video conferences.
Wiretapping: This is a type of eavesdropping that involves the interception of electronic communications, such as phone calls or internet traffic, by tapping into a wire or cable.
Social engineering: This refers to the use of deception or manipulation to gain access to confidential information, such as passwords or security codes.
Dumpster diving: This is the practice of searching through someone's garbage or recycling to find confidential information, such as bank statements or credit card offers.
Overall, confidentiality concerns highlight the need for strong security measures, such as encryption and access controls, to prevent unauthorized access or disclosure of sensitive information.
Integrity concerns in security CIA
Integrity is one of the three pillars of information security, along with confidentiality and availability. It involves maintaining the accuracy and consistency of data over its entire lifecycle.
Man-in-the-middle (MITM) attack: In this type of attack, an attacker intercepts the communication between two parties and actively monitors, captures, and manipulates the communication. The attacker can modify or replace messages, steal sensitive information, and insert malicious code into the communication stream.
Replay attack: A replay attack occurs when an attacker intercepts and records a legitimate data transmission and then retransmits the recorded data to the recipient. This type of attack can be used to circumvent authentication mechanisms, such as password authentication, by replaying a previously recorded authentication request.
Impersonation: Impersonation is the act of assuming the identity of another person or entity in order to gain access to systems or data. Impersonation can be accomplished through various means, such as stealing credentials or exploiting vulnerabilities in a system.
Unauthorized information alteration: Unauthorized information alteration refers to any unauthorized changes made to data, whether intentional or unintentional. This can include changes made by attackers as well as accidental changes made by authorized users.
Overall, these integrity concerns can result in the compromise of the accuracy and consistency of data, leading to potential financial and reputational damage. It is essential to implement measures such as encryption, access controls, and monitoring to prevent and detect these types of attacks.